SlideShare ist ein Scribd-Unternehmen logo
1 von 10
OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Who CARES?? You should.  And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE:  We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
So what…. The hackers want the rest of your information (IF they don’t have it already)  ……..and will be  attacking you for it. 3 Types of emails you may see:  Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to:  Create a new account  Change your password  Confirm your email address  Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach)  This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out.   In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Email 3: From a Third Party  These emails will be from the hackers, disguised as one from:  Government  Trade Association  ISP  Web Domain Hosting Company  Law Firm leading a class action lawsuit against Epsilon et al.  It will say something like: “We are contacting you to verify/assure you/ask you to participate.  If your name is on the list attached, there are funds available to protect your data.  This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action)  In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
The BEST viruses and worms Exist on the computer without you even knowing.  The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
How to Protect Yourself & Your Data Set up an brand new email address at Gmail.   Visit the websites of the retailers you  frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created.  Update your Anti-Virus, Anti-Spyware software.  Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them.  NOTE:  READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!).  I’d suggest Carbonite, Mozy, or SugarSync for remote backup service.  Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in.  This information is meant to be a helpful guide to get you started on the right track.  The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123  info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved

Weitere ähnliche Inhalte

Ähnlich wie Introduction to the Epsilon Data Breach

CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix Systems
Tea C.
 

Ähnlich wie Introduction to the Epsilon Data Breach (20)

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018
 
Intellix Systems
Intellix SystemsIntellix Systems
Intellix Systems
 
SpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help CenterSpyFly Background Checks Services Help Center
SpyFly Background Checks Services Help Center
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Email marketing masterclass june 2013
Email marketing masterclass june 2013Email marketing masterclass june 2013
Email marketing masterclass june 2013
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Email Inbox Troubleshooting Guide
Email Inbox Troubleshooting GuideEmail Inbox Troubleshooting Guide
Email Inbox Troubleshooting Guide
 

Mehr von The Lorenzi Group

ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
The Lorenzi Group
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
The Lorenzi Group
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
The Lorenzi Group
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
The Lorenzi Group
 

Mehr von The Lorenzi Group (20)

Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
 
ROAR for IT Managers
ROAR for IT ManagersROAR for IT Managers
ROAR for IT Managers
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
 
The Many Faces of SHIELD
The Many Faces of SHIELDThe Many Faces of SHIELD
The Many Faces of SHIELD
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Sex, Crime, & Online Slime
Sex, Crime, & Online SlimeSex, Crime, & Online Slime
Sex, Crime, & Online Slime
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Kürzlich hochgeladen (20)

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 

Introduction to the Epsilon Data Breach

  • 1. OOPs…Epsilon had a Data Breach…. What does this mean to YOU? (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 2. FACTS Epsilon is a large email marketing company. When you receive emails from banks, recruiting companies, stores, and other organizations, there is a HIGH likelihood it is originating at Epsilon. Epsilon has reported that EMAIL addresses were stolen Epsilon is not able to confirm if EMAIL was all that was taken (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 3. Who CARES?? You should. And here is why: It’s GREAT (for Epsilon) if ONLY email addresses were stolen, however those email accounts were stored in a database that tracked who Epsilon’s clients were, so the hackers likely also have the companies you have relationships with (Chase, JP Morgan, Best Buy, Walgreens, Robert Half Recruiters, Target, Disney, and MANY others…..) NOTE: We ALL need to be aware of how companies handle private information, otherwise it can be used against us! (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 4. So what…. The hackers want the rest of your information (IF they don’t have it already) ……..and will be attacking you for it. 3 Types of emails you may see: Vendor Email Competitor Email Third-Party Email (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 5. Email 1: From the Vendor An email from the hackers, disguised as an email from the vendor apologizing and asking you to: Create a new account Change your password Confirm your email address Sign up for free protection service Something else In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 6. Email 2: From a Competitor An email form the hackers, disguised as an email from the vendor’s competitor. (example ONLY: from Wal-Mart b/c they do not appear to have been affected by this breach) This email will discuss the recent breach and how their organization takes “extra” precautions and that they know consumers are concerned. They will be offering something (maybe a 20% discount) for first time buyers to try them out. In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 7. Email 3: From a Third Party These emails will be from the hackers, disguised as one from: Government Trade Association ISP Web Domain Hosting Company Law Firm leading a class action lawsuit against Epsilon et al. It will say something like: “We are contacting you to verify/assure you/ask you to participate. If your name is on the list attached, there are funds available to protect your data. This is free money you can use to pay bills, change your email address, or buy updated antivirus software….” (whatever it is, it will be some offer or call to action) In the email, it will say “click here” or “click this link”– DO NOT “click here”!) (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 8. The BEST viruses and worms Exist on the computer without you even knowing. The second you click the link or open the attachment, expect your data to be shared. Which data? Passwords User Names Credit Card and Banking Information Documents Pictures & Videos Anything else the hackers want (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 9. How to Protect Yourself & Your Data Set up an brand new email address at Gmail. Visit the websites of the retailers you frequent. NOTE: Anyplace you have an account. Log in and change the existing email address they have on file to this new email address you just created. Update your Anti-Virus, Anti-Spyware software. Run a full scan of your computer system and network. Download TrueCrypt and encrypt your files so only YOU can open them. NOTE: READ the directions with the program and TEST on a file first so you don’t lose anything critical. Back-up all of your documents and files (don’t forget iTunes and Pictures!). I’d suggest Carbonite, Mozy, or SugarSync for remote backup service. Proactively monitor your network – check computer processes, check firewall logs, educate employees – or use a service like Active Network Monitoring by The Lorenzi Group Finally, remember, this is not an all-inclusive list of things to do or order to do them in. This information is meant to be a helpful guide to get you started on the right track. The Lorenzi Group is not responsible for any losses or negative affects from you taking any, all, or none of these steps to protect your data (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved
  • 10. Resources Epsilon – www.epsilon.com Gmail – mail.google.com AVG – free.avg.com Avira– www.avira.com TruCrypt - www.truecrypt.org Carbonite - www.carbonite.com Mozy - www.mozy.com SugarSync - www.sugarsync.com FCC – www.fcc.org The Lorenzi Group 866-632-9880 x123 info@thelorenzigroup.com www.thelorenzigroup.com (C) 2011 - Property of The Lorenzi Group LLC - All Rights Reserved